Reporting on GDPR Compliance to the Board (Englisch)
- Neue Suche nach: Pearce, Guy
- Neue Suche nach: Pearce, Guy
In:
ISACA journal
;
1
;
32-39
;
2019
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Reporting on GDPR Compliance to the Board
-
Beteiligte:Pearce, Guy ( Autor:in )
-
Erschienen in:ISACA journal ; 1 ; 32-39
-
Verlag:
- Neue Suche nach: Information Systems Audit and Control Association
-
Erscheinungsdatum:01.01.2019
-
Format / Umfang:8 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 657.450285
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 657.450285 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 1
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Information Security Matters: Managing Availability in the Multi-Modal EraRoss, Steven J. et al. | 2018
- 3
-
Information Security Matters: Extra, Extra, Read All About ItRoss, S.J. et al. | 2014
- 4
-
Information Security Matters: State-on-state CyberconflictsRoss, Steven J. et al. | 2017
- 4
-
Information Security Matters: Microwave SoftwareRoss, S.J. et al. | 2015
- 4
-
Information Security Matters: A Fundamental QuestionRoss, S.J. et al. | 2011
- 4
-
Information Security Matters: A Room With MachinesRoss, S.J. et al. | 2012
- 4
-
Information Security Matters: Fifty Years of Information SecurityRoss, Steven J. et al. | 2019
- 4
-
Guest Editorial: Forget the Governance! What to Do When the CEO Says `Get It Done!'Guldentops, E. et al. | 2013
- 5
-
Information Security Matters: Mean TimesRoss, S.J. et al. | 2013
- 5
-
Cloud Computing: Process Automation From the CloudRauscher, J. et al. | 2014
- 6
-
Guest Editorial: Monitoring From the Cloud-Insights on DemandCangemi, M.P. et al. | 2015
- 6
-
IS Audit Basics: Backup and RecoveryCooke, Ian et al. | 2018
- 6
-
Cloud Computing: Securing Cloud-based ApplicationsMendelsohn, M. / Philipovitch, A. / Welch, W. / Zanella, R. et al. | 2012
- 7
-
IT Audit Basics: How the IT Auditor Can Make Substantive Contributions to a Financial AuditSingleton, T.W. et al. | 2011
- 7
-
Cloud Computing: Shifting the Focus to Long-term, Value-add Projects With a Cloud EnvironmentPirooz, S. et al. | 2013
- 7
-
IS Audit Basics: Assurance Considerations for Ongoing GDPR ConformanceCooke, Ian et al. | 2019
- 7
-
IS Audit Basics: Understanding the Cybercrime WaveSingleton, T. et al. | 2014
- 8
-
The NetworkHeikkinen, T. et al. | 2015
- 8
-
IS Audit Basics: Preparing for Auditing New Risk, Part 1Gelbstein, Ed et al. | 2017
- 9
-
IT Audit Basics: Evaluating Access Controls Over DataSingleton, T.W. et al. | 2012
- 10
-
IS Audit Basics: Perspectives From a Seasoned PractitionerGelbstein, E. et al. | 2015
- 10
-
Five Questions WithFeinman, T. et al. | 2011
- 10
-
IT Audit Basics: How to Properly Audit a Client Who Uses a Service Organization-SOC Report or No SOC ReportSingleton, T.W. et al. | 2013
- 12
-
Cloud Computing: Are Your Data Secure in the Cloud?Nye, J. et al. | 2015
- 12
-
Book Review: IT Governance for CEOs and Members of the BoardEtea, I.K. et al. | 2014
- 13
-
Book Review: Big Data: A Revolution That Will Transform How We Live, Work, and ThinkParekh, U. et al. | 2014
- 13
-
Cloudifying Threats—Understanding Cloud App Attacks and DefensesSood, Aditya K. / Jalil, Rehan et al. | 2018
- 14
-
The Automation ConundrumZongo, Phillimon et al. | 2017
- 14
-
SCADA Cybersecurity FrameworkMalaviya, S. et al. | 2014
- 14
-
Data Privacy, Data Protection and the Importance of Integration for GDPR ComplianceBrunswick, Dave et al. | 2019
- 14
-
Database Backup and Recovery Best PracticesAkhtar, A.N. / Buchholtz, J. / Ryan, M. / Setty, K. et al. | 2012
- 16
-
Book Review: Cybersecurity and Cyberwar: What Everyone Needs to KnowMarks, L. et al. | 2015
- 16
-
Book Review: IT Governance: A Pocket GuideSule, D. et al. | 2013
- 16
-
Auditing Security Risks in Virtual IT SystemsChaudhuri, A. / von Solms, S.H. / Chaudhuri, D. et al. | 2011
- 17
-
Book Review: Secure: Insights From the People Who Keep Information SafeKivisild, A.K. et al. | 2015
- 17
-
Governance Implementation-COBIT 5 and ISOMarks, L. et al. | 2013
- 18
-
NIST's New Password Rule BookFulmer, Bachman / Walters, Melissa / Arnold, Bill et al. | 2019
- 18
-
Effective Cyberthreat Management Evolution and BeyondSehgal, S. et al. | 2015
- 19
-
Key Considerations in Protecting Sensitive Data Leakage Using Date Loss Prevention ToolsKumaresan, N. et al. | 2014
- 20
-
Key Issues, Challenges and Resolutions in Implementing Business Continuity ProjectsTammineedi, R.L.S. et al. | 2012
- 22
-
Implementing an Information Security Continuous Monitoring Solution-A Case StudyLuu, T. et al. | 2015
- 22
-
Phishing Detection and Loss Computation Hybrid ModelBiswas, Baidyanath / Mukhopadhyay, Arunabha et al. | 2017
- 23
-
Mistakes Happen! Mitigating Unintentional Data LossVan Stone, Mike / Halpert, Ben et al. | 2018
- 24
-
Effective IT Governance Through the Three Lines of Defense, Risk IT and COBITOyemade, R. et al. | 2012
- 24
-
IT Policy Framework Based on COBIT 5Carrillo, J. et al. | 2013
- 24
-
The Road to GDPR ComplianceBarclay, Corlane et al. | 2019
- 24
-
Challenges and Benefits of Migrating to COBIT 5 in the Strongly Regulated Environment of EU Agricultural Paying AgenciesArcidlacono, G. et al. | 2014
- 26
-
A Young Professional's Guide to Career Success Using Soft SkillsKandra, M. / Sewell, T. / Nyamari, J. et al. | 2011
- 27
-
Auditing for PII Security ComplianceMohammed, D. et al. | 2014
- 28
-
Influence of International Best Practices on the South African Public Service's Corporate Governance of ICTvan der Walt, T. / Coetsee, A.D. / von Solms, S.H. et al. | 2013
- 29
-
User Threats Vs. User PrivacyVlachos, D. et al. | 2015
- 30
-
Applying AI in Application SecurityMaraju, Kiran et al. | 2018
- 30
-
Information Risk Management for Supporting a Basel II InitiativeDutta, A. / Sista, P. et al. | 2012
- 30
-
Sponsored Feature: Why Attackers Are Turning Their Attention Toward ERP ApplicationsPerez-Etchegoyen, Juan Pablo et al. | 2019
- 31
-
Understanding Software Metric UseHenderson, D. / Sheetz, S.D. / Wallace, L. et al. | 2015
- 31
-
Chain Exploitation-Social Networks MalwareSood, A.K. / Enbody, R. et al. | 2011
- 31
-
Sponsored Feature: Indicators of Exposure and Attack Surface VisualizationCircus, Ravid et al. | 2017
- 31
-
Risk Management in 4G LTEBhasker, D. et al. | 2014
- 32
-
Reporting on GDPR Compliance to the BoardPearce, Guy et al. | 2019
- 33
-
Creating the Business Case for ERP System Acquisitions Using GEITZoughbi, G. et al. | 2013
- 36
-
Meeting Security and Compliance Requirements Efficiently With TokenizationBeiseel, S. et al. | 2014
- 37
-
Big Data Deidentification, Reidentification and AnonymizationKhan, Mohammed J. et al. | 2018
- 37
-
A Machine Learning Approach for Telemedicine GovernancePal, Shounak / Mukhopadhyay, Arunabha et al. | 2017
- 38
-
Simplify and Layer Your Security Approach to Protect Card DataHorton, T. et al. | 2011
- 38
-
Auditing SQL Server Databases Using CAATsCooke, I. et al. | 2015
- 38
-
The Devil's in the DetailsDavis, S. / Ferrell, P. / Scranton, S. / Millar, P. et al. | 2012
- 39
-
BYOD Security Considerations of Full Mobility and Third-party Cloud ComputingYu, W.E. et al. | 2013
- 40
-
The Optimal Risk Management FrameworkMarks, Larry et al. | 2019
- 42
-
Incorporating COBIT Best Practices in PCI DSS V2.0 for Effective ComplianceNicho, M. et al. | 2012
- 42
-
The Machine Learning Audit—CRISP-DM FrameworkClark, Andrew et al. | 2018
- 42
-
Privacy Audit-Methodology and Related ConsiderationsRiffat, M. et al. | 2014
- 43
-
Audit Accounting Data Using Excel Pivot TablesFilzen, J.J. / Simkin, M.G. et al. | 2015
- 43
-
IT Governance Implementation-Formulating and Presenting Practical Business CasesBhatia, R. et al. | 2013
- 43
-
Information Security From a Business Perspective: A Lottery Sector Case StudyDimitriadis, C.K. et al. | 2011
- 46
-
Building and Maintaining Effective Mechanisms for Implementing IT GovernanceRobinson, I. / Jodha, M. et al. | 2013
- 46
-
Unlocking Hidden Value in ERP System Acquisitions Using Risk ManagementZoughbi, G. et al. | 2014
- 46
-
The Four Questions for Successful DLP ImplementationNanchengwa, Christopher et al. | 2019
- 46
-
Smashing the Information Security Policy for Fun and ProfitDavid Eduardo Acosta, R. et al. | 2017
- 48
-
Implementation of Big Data in Commercial BanksAkanni, Adeniyi et al. | 2018
- 49
-
Information Security Continuous MonitoringHargenrader, B. et al. | 2015
- 49
-
The Modernization Problem, Part 1Henry, K. et al. | 2013
- 52
-
Using Open Source Tools to Support Technology GovernanceMoyle, Ed et al. | 2017
- 52
-
Crossword PuzzleMellor, M. et al. | 2013
- 52
-
Tools: Data Protection ToolsMoyle, Ed et al. | 2018
- 53
-
CPE Quiz #146 Based on Volume 5, 2012Chan, S. et al. | 2013